首页 > 最新文献

2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications最新文献

英文 中文
A detailed analysis of the KDD CUP 99 data set 对KDD CUP 99数据集的详细分析
Mahbod Tavallaee, E. Bagheri, Wei Lu, A. Ghorbani
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly affects the performance of evaluated systems, and results in a very poor evaluation of anomaly detection approaches. To solve these issues, we have proposed a new data set, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.
在过去的十年中,异常检测已经引起了许多研究人员的关注,以克服基于签名的入侵防御系统在检测新型攻击方面的弱点,而KDDCUP'99是最广泛使用的用于评估这些系统的数据集。在对该数据集进行统计分析后,我们发现了两个重要的问题,这些问题严重影响了评估系统的性能,并导致对异常检测方法的评估非常差。为了解决这些问题,我们提出了一个新的数据集,NSL-KDD,它由完整的KDD数据集的选定记录组成,并且没有上述任何缺点。
{"title":"A detailed analysis of the KDD CUP 99 data set","authors":"Mahbod Tavallaee, E. Bagheri, Wei Lu, A. Ghorbani","doi":"10.1109/CISDA.2009.5356528","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356528","url":null,"abstract":"During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks, and KDDCUP'99 is the mostly widely used data set for the evaluation of these systems. Having conducted a statistical analysis on this data set, we found two important issues which highly affects the performance of evaluated systems, and results in a very poor evaluation of anomaly detection approaches. To solve these issues, we have proposed a new data set, NSL-KDD, which consists of selected records of the complete KDD data set and does not suffer from any of mentioned shortcomings.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"28 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81353187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3487
Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network 移动无源传感器网络中非线性变换的偏置现象及分析
Z. Ding, H. Leung
In this article, we consider the bias issue in a passive tracking system which utilizes a mobile passive sensor network, where bearing-only sensors such as Inferred or ESM are used. Biases due to nonlinear transformations have already been recognized, but have not been studied for this particular case of converted pseudo measurements in a mobile passive sensor network. Based on the Taylor series, the bias equations for a network of two passive sensors are derived. Monte Carlo simulation is used for analysis. There are two other non-linear transformations which are related to this study: 1. range/azimuth to X/Y; 2. range/azimuth to latitude/longitude. Insightful studies with explicit expressions are available for the first nonlinear transformation, but not for the second and the new nonlinear transformations. This article will provide an approximate solution and simulation study for the new nonlinear transformation.
在本文中,我们考虑了利用移动无源传感器网络的无源跟踪系统中的偏差问题,其中使用了纯方位传感器,如推断或ESM。由于非线性变换引起的偏差已经被认识到,但还没有研究在移动无源传感器网络中转换伪测量的这种特殊情况。基于泰勒级数,导出了两个无源传感器网络的偏置方程。采用蒙特卡罗模拟进行分析。还有另外两种与本研究相关的非线性变换:1。范围/方位角到X/Y;2. 纬度/经度的距离/方位角。对于第一类非线性变换,用显式表达式进行有见地的研究是可行的,但对于第二类和新的非线性变换,则不可行。本文将为这种新的非线性变换提供近似解和仿真研究。
{"title":"Bias phenomenon and analysis of a nonlinear transformation in a mobile passive sensor network","authors":"Z. Ding, H. Leung","doi":"10.1109/CISDA.2009.5356558","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356558","url":null,"abstract":"In this article, we consider the bias issue in a passive tracking system which utilizes a mobile passive sensor network, where bearing-only sensors such as Inferred or ESM are used. Biases due to nonlinear transformations have already been recognized, but have not been studied for this particular case of converted pseudo measurements in a mobile passive sensor network. Based on the Taylor series, the bias equations for a network of two passive sensors are derived. Monte Carlo simulation is used for analysis. There are two other non-linear transformations which are related to this study: 1. range/azimuth to X/Y; 2. range/azimuth to latitude/longitude. Insightful studies with explicit expressions are available for the first nonlinear transformation, but not for the second and the new nonlinear transformations. This article will provide an approximate solution and simulation study for the new nonlinear transformation.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"97 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74481336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A framework for the design of a military operational supply network 军事作战供应网络的设计框架
A. Ghanmi, A. Martel, J. Berger, A. Boukhtouta
This paper presents a methodology framework for the design of robust and effective military supply networks integrating various supply chain management dimensions. The proposed network design approach accounts for dynamic market demand, capacity, supply and resource conditions in a time-varying uncertain environment. The framework is based upon a two-level decomposition scheme combining design and user model components. The proposed stochastic multi-stage design model problem consists of determining the number and location of facilities (depots) required to satisfy an anticipated set of customer's demands and customer allocation (mission) to depots over a given time horizon. The user model is exploited to produce scenario-based anticipations to the design model required for network design problem-solving, and to assess network design solutions. The user model component mixes lot-sizing decisions with transportation assets assignments. Simulation is expected to be used to dynamically generate stochastic events supporting the construction of solution at both levels. Preliminary results on a military operational support hubs case study are reported and briefly analyzed for a simplified asset pre-positioning problem.
本文提出了一种集成各种供应链管理维度的强大而有效的军事供应网络设计方法框架。提出的网络设计方法考虑了时变不确定环境下动态的市场需求、容量、供应和资源条件。该框架基于结合设计和用户模型组件的两级分解方案。提出的随机多阶段设计模型问题包括确定在给定的时间范围内满足预期的一组客户需求和客户对仓库的分配(任务)所需的设施(仓库)的数量和位置。利用用户模型对网络设计问题解决所需的设计模型产生基于场景的预测,并评估网络设计解决方案。用户模型组件将批量决策与运输资产分配混合在一起。期望用仿真来动态地生成随机事件,以支持这两个层次的解的构造。报告了军事行动支援中心案例研究的初步结果,并简要分析了简化的资产预定位问题。
{"title":"A framework for the design of a military operational supply network","authors":"A. Ghanmi, A. Martel, J. Berger, A. Boukhtouta","doi":"10.1109/CISDA.2009.5356523","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356523","url":null,"abstract":"This paper presents a methodology framework for the design of robust and effective military supply networks integrating various supply chain management dimensions. The proposed network design approach accounts for dynamic market demand, capacity, supply and resource conditions in a time-varying uncertain environment. The framework is based upon a two-level decomposition scheme combining design and user model components. The proposed stochastic multi-stage design model problem consists of determining the number and location of facilities (depots) required to satisfy an anticipated set of customer's demands and customer allocation (mission) to depots over a given time horizon. The user model is exploited to produce scenario-based anticipations to the design model required for network design problem-solving, and to assess network design solutions. The user model component mixes lot-sizing decisions with transportation assets assignments. Simulation is expected to be used to dynamically generate stochastic events supporting the construction of solution at both levels. Preliminary results on a military operational support hubs case study are reported and briefly analyzed for a simplified asset pre-positioning problem.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"291 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76312350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection of slow malicious worms using multi-sensor data fusion 基于多传感器数据融合的慢速恶意蠕虫检测
Frank Akujobi, I. Lambadaris, E. Kranakis
Detection of slow worms is particularly challenging due to the stealthy nature of their propagation techniques and their ability to blend with normal traffic patterns. In this paper, we propose a distributed detection approach based on the Generalized Evidence Processing (GEP) theory, a sensor integration and data fusion technique. With GEP theory, evidence collected by distributed detectors determine the probability associated with a detection decision under a hypothesis. The collected evidence is combined to arrive at an optimal fused detection decision by minimizing a cummulative decision risk function. Typically, malicious traffic flows of varying scanning rates can occur in the wild, and the difficulty in detecting slow scanning worms in particular can be exacerbated by interference from other traffic flows scanning at faster rates. Our proposed detection technique uses a window-based self adapting profiler to filter detected malicious traffic profiles with scanning rates greater than the low scanning rates we are interested in. Experiments on a live test-bed are used to demonstrate behavior of the technique.
由于其传播技术的隐身性和与正常流量模式混合的能力,检测慢蠕虫特别具有挑战性。本文提出了一种基于广义证据处理(GEP)理论的分布式检测方法,该方法是一种传感器集成和数据融合技术。在GEP理论中,由分布式检测器收集的证据决定了在假设下与检测决策相关的概率。将收集到的证据结合起来,通过最小化累积决策风险函数来获得最优的融合检测决策。通常,具有不同扫描速率的恶意通信流可能会在野外发生,并且由于来自其他以更快速度扫描的通信流的干扰,检测慢扫描蠕虫的困难可能会加剧。我们提出的检测技术使用基于窗口的自适应分析器来过滤扫描速率大于我们感兴趣的低扫描速率的检测到的恶意流量配置文件。在现场试验台上进行了实验,以验证该技术的性能。
{"title":"Detection of slow malicious worms using multi-sensor data fusion","authors":"Frank Akujobi, I. Lambadaris, E. Kranakis","doi":"10.1109/CISDA.2009.5356557","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356557","url":null,"abstract":"Detection of slow worms is particularly challenging due to the stealthy nature of their propagation techniques and their ability to blend with normal traffic patterns. In this paper, we propose a distributed detection approach based on the Generalized Evidence Processing (GEP) theory, a sensor integration and data fusion technique. With GEP theory, evidence collected by distributed detectors determine the probability associated with a detection decision under a hypothesis. The collected evidence is combined to arrive at an optimal fused detection decision by minimizing a cummulative decision risk function. Typically, malicious traffic flows of varying scanning rates can occur in the wild, and the difficulty in detecting slow scanning worms in particular can be exacerbated by interference from other traffic flows scanning at faster rates. Our proposed detection technique uses a window-based self adapting profiler to filter detected malicious traffic profiles with scanning rates greater than the low scanning rates we are interested in. Experiments on a live test-bed are used to demonstrate behavior of the technique.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"30 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90307960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding under actuator failures 执行器故障下飞机自动着舰的模糊神经容错控制方法
Hai-Jun Rong, N. Sundararajan
In the paper, two fuzzy-neuro control schemes are presented for an aircraft automatic landing problem under the failures of stuck control surfaces and severe winds. The scheme incorporates a fuzzy-neuro controller which augments an existing conventional controller called Baseline Trajectory Following Controller (BTFC). Two fuzzy-neuro controllers have been designed using the recently proposed fuzzy-neuro algorithms named Sequential Adaptive Fuzzy Inference System (SAFIS) and Online Sequential Fuzzy Extreme Learning Machine (OS-Fuzzy-ELM) and a detailed performance comparison has been made. For this study, the following fault scenarios have been considered: i) Single fault of either aileron or elevator stuck at certain deflections and ii) Double fault cases where one aileron and one elevator at the same or opposite direction are stuck at different deflections. The simulation studies indicate that the OS-Fuzzy-ELM achieves better fault-tolerant capabilities compared with SAFIS.
针对某型飞机在控制面卡滞和大风条件下的自动着陆问题,提出了两种模糊神经控制方案。该方案结合了模糊神经控制器,增强了现有的基线轨迹跟踪控制器(BTFC)。利用最近提出的模糊神经算法,设计了两个模糊神经控制器,分别是顺序自适应模糊推理系统(SAFIS)和在线顺序模糊极限学习机(OS-Fuzzy-ELM),并进行了详细的性能比较。本研究考虑了以下两种故障情况:1)副翼或升降舵处于某一挠度的单故障;2)同一方向或相反方向的副翼和升降舵处于不同挠度的双故障。仿真研究表明,与SAFIS相比,OS-Fuzzy-ELM具有更好的容错能力。
{"title":"Fuzzy-neuro fault-tolerant control schemes for aircraft autolanding under actuator failures","authors":"Hai-Jun Rong, N. Sundararajan","doi":"10.1109/CISDA.2009.5356559","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356559","url":null,"abstract":"In the paper, two fuzzy-neuro control schemes are presented for an aircraft automatic landing problem under the failures of stuck control surfaces and severe winds. The scheme incorporates a fuzzy-neuro controller which augments an existing conventional controller called Baseline Trajectory Following Controller (BTFC). Two fuzzy-neuro controllers have been designed using the recently proposed fuzzy-neuro algorithms named Sequential Adaptive Fuzzy Inference System (SAFIS) and Online Sequential Fuzzy Extreme Learning Machine (OS-Fuzzy-ELM) and a detailed performance comparison has been made. For this study, the following fault scenarios have been considered: i) Single fault of either aileron or elevator stuck at certain deflections and ii) Double fault cases where one aileron and one elevator at the same or opposite direction are stuck at different deflections. The simulation studies indicate that the OS-Fuzzy-ELM achieves better fault-tolerant capabilities compared with SAFIS.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"157 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76890607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing 优化演化黑盒漏洞测试下的异常检测器部署
H. G. Kayack, A. N. Zincir-Heywood, M. Heywood, S. Burschka
This work focuses on testing anomaly detectors from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly detection systems two capabilities. Firstly, no knowledge of protected data structures need to be assumed (i.e. the detector is a black-box), where the time, knowledge and availability of tools to perform such an analysis might not be generally available. Secondly, the evolved exploits are then able to demonstrate weaknesses in the ensuing detector parameterization. Therefore, the system administrator can identify the suitable parameters for the effective operation of the detector. EEG is employed against two second generation anomaly detectors, namely pH and pH with schema mask, on four UNIX applications in order to perform a vulnerability assessment and make a comparison between the two detectors.
本文主要从多目标进化漏洞生成器(EEG)的角度对异常检测器进行测试。这种框架为异常检测系统的用户提供了两种功能。首先,不需要假定对受保护的数据结构有任何了解(即检测器是一个黑盒),因为执行这种分析的时间、知识和工具的可用性通常是不具备的。其次,进化的漏洞能够证明随后的检测器参数化中的弱点。因此,系统管理员可以确定合适的参数,使探测器有效运行。利用EEG对四个UNIX应用程序上的两种第二代异常检测器pH和带模式掩码的pH进行漏洞评估,并对两种检测器进行比较。
{"title":"Optimizing anomaly detector deployment under evolutionary black-box vulnerability testing","authors":"H. G. Kayack, A. N. Zincir-Heywood, M. Heywood, S. Burschka","doi":"10.1109/CISDA.2009.5356546","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356546","url":null,"abstract":"This work focuses on testing anomaly detectors from the perspective of a Multi-objective Evolutionary Exploit Generator (EEG). Such a framework provides users of anomaly detection systems two capabilities. Firstly, no knowledge of protected data structures need to be assumed (i.e. the detector is a black-box), where the time, knowledge and availability of tools to perform such an analysis might not be generally available. Secondly, the evolved exploits are then able to demonstrate weaknesses in the ensuing detector parameterization. Therefore, the system administrator can identify the suitable parameters for the effective operation of the detector. EEG is employed against two second generation anomaly detectors, namely pH and pH with schema mask, on four UNIX applications in order to perform a vulnerability assessment and make a comparison between the two detectors.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"85 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84110663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emitter geolocation using low-accuracy direction-finding sensors 使用低精度测向传感器的发射器地理定位
Derek Elsaesser
This paper examines the concept of replacing a few expensive high-accuracy radio direction-finding (DF) sensors operating in a stand-off baseline with many low-accuracy DF sensors deployed on existing military vehicles located throughout an area of interest. A formula is presented to estimate the geolocation accuracy that could be achieved for a given number of sensors with a specified DF accuracy. Monte Carlo and virtual simulation of sensors with varying DF accuracy is used to assess the accuracy and reliability of the geolocation estimates that could be achieved. Geolocation results are computed using Stansfield's method and a technique developed at DRDC Ottawa, called the Discrete Probability Density (DPD) method, and compared to the theoretical location accuracy limit predicted by the Cramer-Rao Lower Bound. The DPD method is shown to provide more accurate and more reliable geolocation estimates than Stansfield's method when incorporating large quantities of low-accuracy DF data. This suggests that the DPD method could be used with several less-expensive low-accuracy DF sensors to provide improved emitter geolocation capability compared to the conventional deployment of a few high-accuracy DF sensors.
本文研究了用部署在整个感兴趣区域的现有军用车辆上的许多低精度无线电测向传感器取代在对峙基线中运行的一些昂贵的高精度无线电测向(DF)传感器的概念。给出了一个公式来估计给定数量的传感器在给定DF精度下所能达到的地理定位精度。利用蒙特卡罗和不同DF精度传感器的虚拟仿真来评估可能实现的地理定位估计的准确性和可靠性。地理定位结果使用Stansfield的方法和渥太华DRDC开发的一种称为离散概率密度(DPD)方法进行计算,并与Cramer-Rao下界预测的理论定位精度极限进行比较。当纳入大量低精度DF数据时,DPD方法比Stansfield方法提供更准确、更可靠的地理位置估计。这表明,与传统部署的几个高精度DF传感器相比,DPD方法可以与几个更便宜的低精度DF传感器一起使用,以提供改进的发射器地理定位能力。
{"title":"Emitter geolocation using low-accuracy direction-finding sensors","authors":"Derek Elsaesser","doi":"10.1109/CISDA.2009.5356549","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356549","url":null,"abstract":"This paper examines the concept of replacing a few expensive high-accuracy radio direction-finding (DF) sensors operating in a stand-off baseline with many low-accuracy DF sensors deployed on existing military vehicles located throughout an area of interest. A formula is presented to estimate the geolocation accuracy that could be achieved for a given number of sensors with a specified DF accuracy. Monte Carlo and virtual simulation of sensors with varying DF accuracy is used to assess the accuracy and reliability of the geolocation estimates that could be achieved. Geolocation results are computed using Stansfield's method and a technique developed at DRDC Ottawa, called the Discrete Probability Density (DPD) method, and compared to the theoretical location accuracy limit predicted by the Cramer-Rao Lower Bound. The DPD method is shown to provide more accurate and more reliable geolocation estimates than Stansfield's method when incorporating large quantities of low-accuracy DF data. This suggests that the DPD method could be used with several less-expensive low-accuracy DF sensors to provide improved emitter geolocation capability compared to the conventional deployment of a few high-accuracy DF sensors.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"168 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72672547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Secure two and multi-party association rule mining 安全的双方和多方关联规则挖掘
Saeed Samet, A. Miri
Association rule mining provides useful knowledge from raw data in different applications such as health, insurance, marketing and business systems. However, many real world applications are distributed among two or more parties, each of which wants to keep its sensitive information private, while they collaboratively gaining some knowledge from their data. Therefore, secure and distributed solutions are needed that do not have a central or third party accessing the parties' original data. In this paper, we present a new protocol for privacy-preserving association rule mining to overcome the security flaws in existing solutions, with better performance, when data is vertically partitioned among two or more parties. Two sub-protocols for secure binary dot product and cardinality of set intersection for binary vectors are also designed which are used in the main protocols as building blocks.
关联规则挖掘从不同应用程序(如健康、保险、营销和业务系统)中的原始数据中提供有用的知识。然而,许多现实世界的应用程序分布在两个或多个参与方之间,每个参与方都希望保持其敏感信息的私密性,同时他们协作地从他们的数据中获取一些知识。因此,需要安全的分布式解决方案,这些解决方案不需要中央或第三方访问双方的原始数据。在本文中,我们提出了一种新的保护隐私的关联规则挖掘协议,以克服现有解决方案中的安全缺陷,并在数据在两个或多个参与方之间垂直分区时具有更好的性能。设计了安全二进制点积和二进制向量集交基数两个子协议,作为主协议的构建块。
{"title":"Secure two and multi-party association rule mining","authors":"Saeed Samet, A. Miri","doi":"10.1109/CISDA.2009.5356544","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356544","url":null,"abstract":"Association rule mining provides useful knowledge from raw data in different applications such as health, insurance, marketing and business systems. However, many real world applications are distributed among two or more parties, each of which wants to keep its sensitive information private, while they collaboratively gaining some knowledge from their data. Therefore, secure and distributed solutions are needed that do not have a central or third party accessing the parties' original data. In this paper, we present a new protocol for privacy-preserving association rule mining to overcome the security flaws in existing solutions, with better performance, when data is vertically partitioned among two or more parties. Two sub-protocols for secure binary dot product and cardinality of set intersection for binary vectors are also designed which are used in the main protocols as building blocks.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"111 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73403435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Control of unmanned aerial vehicles for passive detection and tracking of multiple emitters 无人机多辐射源被动探测与跟踪控制
P. Sarunic, R. Evans, W. Moran
An algorithm for trajectory optimization of autonomous aerial vehicles performing multiple target tracking is proposed. The problem is approached by formulating it as a partially observed Markov decision process (POMDP) and developing a moving-horizon solution taking into account short and long term costs. To evaluate the effectiveness of the approach a simulation involving multiple UAVs and targets is performed.
提出了一种自主飞行器多目标跟踪的轨迹优化算法。该问题通过将其表述为部分可观察的马尔可夫决策过程(POMDP)并开发考虑短期和长期成本的移动视界解决方案来解决。为了评估该方法的有效性,进行了涉及多架无人机和目标的仿真。
{"title":"Control of unmanned aerial vehicles for passive detection and tracking of multiple emitters","authors":"P. Sarunic, R. Evans, W. Moran","doi":"10.1109/CISDA.2009.5356551","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356551","url":null,"abstract":"An algorithm for trajectory optimization of autonomous aerial vehicles performing multiple target tracking is proposed. The problem is approached by formulating it as a partially observed Markov decision process (POMDP) and developing a moving-horizon solution taking into account short and long term costs. To evaluate the effectiveness of the approach a simulation involving multiple UAVs and targets is performed.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"52 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75785986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Canadian artic Sovereignty: Local intervention by flocking UAVs 加拿大的北极主权:通过蜂拥而至的无人机进行地方干预
G. Labonté
The importance of local intervention capability for the assertion of Canadian Sovereignty in the Northwest Passage is recognized. However, Canada lacks the ability to deploy, on demand, assets to search a wide area for rescue or surveillance purposes in the North. This fact motivated our investigation of the feasibility of a rapid intervention system based on a carrier-scouts design in which a number of unmanned aerial vehicles (UAVs) would be transported, air launched and recovered by a carrier aircraft. These UAVs would have the ability to self-organize in formations that correspond to the task at hand. When searching for a target, they would fly in a linear pattern so that the search area swept per hour and the probability of detecting the target would be considerably increased. A 1973 report by the Tactical Combat Aircraft Programs of the Boeing Aerospace Company for the US Air Force and a 2007 thesis by Chalamont indicate that airborne launch and recovery of many UAVs from a carrier aircraft is feasible and requires only already existing technology. We propose here a solution to the remaining problem of managing simultaneously the many UAVs that are required by the vastness of the areas to be surveyed, with a minimum number of human controllers and communications. Namely, we present algorithms for the self-organization of the UAVs in the required formations. These allow for surveillance operations during which close-up images would be acquired of activities in a region of interest, and searching an area for assets in distress and providing a visual presence for such. We reach the conclusion that our proposed local intervention system with flocking UAVs is feasible and would provide a valuable asset for asserting Canadian Sovereignty in the North.
地方干预能力对于维护加拿大在西北航道的主权的重要性得到了承认。然而,加拿大缺乏根据需要部署资产在北方进行大范围搜救或监视的能力。这一事实促使我们对基于舰载侦察机设计的快速干预系统的可行性进行了调查,其中许多无人驾驶飞行器(uav)将由舰载机运输,空中发射和回收。这些无人机将有能力根据手头的任务自组织编队。在搜索目标时,它们将以线性模式飞行,这样每小时扫描的搜索区域和发现目标的概率将大大增加。波音航空航天公司1973年为美国空军编写的战术作战飞机项目报告和Chalamont 2007年的一篇论文表明,从舰载机上发射和回收许多无人机是可行的,只需要已经存在的技术。我们在这里提出了一个解决方案,以同时管理许多无人机的剩余问题,这些无人机是由浩瀚的待调查区域所要求的,具有最少数量的人类控制器和通信。也就是说,我们提出了无人机在所需编队中的自组织算法。这些设备可用于监视行动,在此期间可获得某一地区活动的特写图像,并可在某一地区搜索遇险资产,并提供这些资产的视觉存在。我们得出的结论是,我们提出的蜂群无人机的地方干预系统是可行的,并将为维护加拿大在北方的主权提供宝贵的资产。
{"title":"Canadian artic Sovereignty: Local intervention by flocking UAVs","authors":"G. Labonté","doi":"10.1109/CISDA.2009.5356552","DOIUrl":"https://doi.org/10.1109/CISDA.2009.5356552","url":null,"abstract":"The importance of local intervention capability for the assertion of Canadian Sovereignty in the Northwest Passage is recognized. However, Canada lacks the ability to deploy, on demand, assets to search a wide area for rescue or surveillance purposes in the North. This fact motivated our investigation of the feasibility of a rapid intervention system based on a carrier-scouts design in which a number of unmanned aerial vehicles (UAVs) would be transported, air launched and recovered by a carrier aircraft. These UAVs would have the ability to self-organize in formations that correspond to the task at hand. When searching for a target, they would fly in a linear pattern so that the search area swept per hour and the probability of detecting the target would be considerably increased. A 1973 report by the Tactical Combat Aircraft Programs of the Boeing Aerospace Company for the US Air Force and a 2007 thesis by Chalamont indicate that airborne launch and recovery of many UAVs from a carrier aircraft is feasible and requires only already existing technology. We propose here a solution to the remaining problem of managing simultaneously the many UAVs that are required by the vastness of the areas to be surveyed, with a minimum number of human controllers and communications. Namely, we present algorithms for the self-organization of the UAVs in the required formations. These allow for surveillance operations during which close-up images would be acquired of activities in a region of interest, and searching an area for assets in distress and providing a visual presence for such. We reach the conclusion that our proposed local intervention system with flocking UAVs is feasible and would provide a valuable asset for asserting Canadian Sovereignty in the North.","PeriodicalId":6407,"journal":{"name":"2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications","volume":"45 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2009-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75122258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1